Summary: SELinux is preventing /usr/bin/canberra-gtk-play "write" access on /var/run/pulse/native. Detailed Description: SELinux denied access requested by canberra-gtk-pl. It is not expected that this access is required by canberra-gtk-pl and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Allowing Access: You can generate a local policy module to allow this access - see FAQ (http://docs.fedoraproject.org/selinux-faq-fc5/#id2961385) Please file a bug report. Additional Information: Source Context system_u:system_r:xdm_t:s0-s0:c0.c1023 Target Context system_u:object_r:var_run_t:s0 Target Objects /var/run/pulse/native [ sock_file ] Source canberra-gtk-pl Source Path /usr/bin/canberra-gtk-play Port <Unknown> Host (removed) Source RPM Packages libcanberra-gtk2-0.22-1.fc12 Target RPM Packages Policy RPM selinux-policy-3.6.32-78.fc12 Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Plugin Name catchall Host Name (removed) Platform Linux (removed) 2.6.32.7-39.fc12.x86_64 #1 SMP Mon Feb 1 00:35:43 UTC 2010 x86_64 x86_64 Alert Count 1 First Seen Tue 02 Feb 2010 02:55:47 PM CET Last Seen Tue 02 Feb 2010 02:55:47 PM CET Local ID bb11aa2c-7f69-4ad5-8a3c-4210586c7bc2 Line Numbers Raw Audit Messages node=(removed) type=AVC msg=audit(1265118947.259:17821): avc: denied { write } for pid=2645 comm="canberra-gtk-pl" name="native" dev=dm-0 ino=353 scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_run_t:s0 tclass=sock_file node=(removed) type=SYSCALL msg=audit(1265118947.259:17821): arch=c000003e syscall=42 success=no exit=-13 a0=8 a1=7fff4ccea6f0 a2=6e a3=7fff4ccea63c items=0 ppid=2608 pid=2645 auid=4294967295 uid=42 gid=469 euid=42 suid=42 fsuid=42 egid=469 sgid=469 fsgid=469 tty=(none) ses=4294967295 comm="canberra-gtk-pl" exe="/usr/bin/canberra-gtk-play" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null) Hash String generated from selinux-policy-3.6.32-78.fc12,catchall,canberra-gtk-pl,xdm_t,var_run_t,sock_file,write audit2allow suggests: #============= xdm_t ============== allow xdm_t var_run_t:sock_file write;
*** This bug has been marked as a duplicate of bug 559843 ***